| 

How NBC's Russian Hack Actually Happened, According to the Security Expert Who Set It Up

  • Post author: Omid Farhang
  • Post published: February 10, 2014
  • Reading Time: 4 min
  • Word Count: 852 words

A couple days ago, NBC News ran a report pegged to the Sochi Olympics about Russian hacking. In it, correspondent Richard Engel uses a ā€œbrand newā€ smartphone to test out the Russian internet while hanging out in a Moscow cafe. ā€œAlmost immediately,ā€ he says in the segment, ā€œwe were hacked.ā€ Naturally, as the security consultant NBC hired for the segment explained today, itā€™s not true. ...

Continue Reading How NBC's Russian Hack Actually Happened, According to the Security Expert Who Set It Up

The FBI is willing to pay top dollar to download some malware

  • Post author: Omid Farhang
  • Post published: February 7, 2014
  • Reading Time: 2 min
  • Word Count: 253 words

The Federal Bureau of Investigation is willing to pay top dollar for the malicious, infectious software the rest of us pay to keep out of our computers, according to the Federal Business Opportunities website. A Monday price quote request by the Investigative Analysis Unit of the agencyā€™s Operational Technology Division is asking computer security developers and retailers to help the agency build a library of malware for an undisclosed reason, letting the companies name their price. ...

Continue Reading The FBI is willing to pay top dollar to download some malware

Firefox 22 enables WebRTC, makes social APIs easier to manage

  • Post author: Omid Farhang
  • Post published: June 26, 2013
  • Reading Time: 2 min
  • Word Count: 285 words

BetaNews: Mozilla has released Firefox 22.0 FINAL for Windows, Mac and Linux. The update includes some platform-specific improvements ā€” Firefox following display scaling options in Windows, and providing download progress indicators in its dock application icon in OS X ā€” plus a number of other tweaks and improvements. Other new features include the ability for users to now manage their social API plug-ins via the Add-ons menu (select Services in the left-hand menu to do so), while users can now adjust the playback rate of HTML5 audio and video files (right-click the playback screen and choose Play Speed to do so). ...

Continue Reading Firefox 22 enables WebRTC, makes social APIs easier to manage

WordPress hardened with XSS, DoS and SSRF fixes

  • Post author: Omid Farhang
  • Post published: June 25, 2013
  • Reading Time: 1 min
  • Word Count: 195 words

With the second security and maintenance release of WordPress 3.5, the developers of the popular open source blogging software have closed 12 bugs, seven of them security issues. In their announcement, the developers ā€œstrongly encourageā€ all users to update all their installations of the software to version 3.5.2 immediately. In addition to the fixed vulnerabilities, the new release also includes some proactive changes intended to harden the platform against attacks. ...

Continue Reading WordPress hardened with XSS, DoS and SSRF fixes

Google cuts grace period for vendors of vulnerable software

  • Post author: Omid Farhang
  • Post published: May 31, 2013
  • Reading Time: 2 min
  • Word Count: 252 words

Google is shortening the amount of time it gives to makers of vulnerable software and web services if there is imminent danger. The Google security team say that if they encounter a zero-day issue that is already being actively used for cyber attacks, it will grant the affected manufacturer just seven days grace to fix the vulnerabilities or publish an advisory with mitigation strategies for users. After seven days, Google wants to publish details of the vulnerability in such a way that users of the vulnerable software can protect themselves from attacks. Previously, the company had given vendors sixty days before it went public with details of vulnerabilities. Google says, though, that it has found zero-day vulnerabilities being used to target a limited subset of people and this targeting makes the attack more serious than a widespread attack and more important to resolve quickly, especially where political activists are being compromised and the attacks can have ā€œreal safety implicationsā€ in some parts of the world. ...

Continue Reading Google cuts grace period for vendors of vulnerable software

Iranian Hackers targeting US oil, gas, and electric companies

  • Post author: Omid Farhang
  • Post published: May 26, 2013
  • Reading Time: 2 min
  • Word Count: 336 words

The Hacker News reported:Ā For all the talk about China and the Syrian Electronic Army, it seems thereā€™s another threat to U.S. cyber interests i.e. Iran. Series of potentially destructive computer attacks that have been targeting American oil, gas and electricity companiesĀ tracked back to Iran. Iranian hackers were able to gain access to control-system software that could allow them to manipulate oil or gas pipelines. Malware have been found in the power grid that could be used to deliver malicious software to damage plants.Ā The targets have included several American oil, gas and electricity companies, which government officials have refused to identify. ...

Continue Reading Iranian Hackers targeting US oil, gas, and electric companies

Name.com domain registrar hacked

  • Post author: Omid Farhang
  • Post published: May 13, 2013
  • Reading Time: 1 min
  • Word Count: 171 words

US domain registrar and web hosting serviceĀ Name.comĀ has fallen victim to a hacker attack. In a recent email, the company informed its customers of an incident that potentially enabled unknown attackers to gain access to ā€œemail addresses, encrypted passwords and encrypted credit card detailsā€. The registrar says that the private crypto keys that are required to decrypt the stolen credit card details are stored on a separate system that wasnā€™t compromised. ...

Continue Reading Name.com domain registrar hacked

Ubuntu 13.04 Raring Ringtail is out, What's new?

  • Post author: Omid Farhang
  • Post published: April 25, 2013
  • Reading Time: 3 min
  • Word Count: 565 words

Canonical has released Ubuntu 13.04 Raring Ringtail, most likely the last release of Ubuntu that will primarily cater for laptop and desktop users. For Ubuntu 13.04, Canonical focused on tightening up the core of the OS and polishing the Unity interface in preparation for Ubuntuā€™s smartphone and tablet debut, which is slated to occur in October with the release of version 13.10. Thereā€™s also the usual slew of package updates, a new Linux kernel, and a couple of new features, too. ...

Continue Reading Ubuntu 13.04 Raring Ringtail is out, What's new?

Symantec vs AV-Comparatives, Which one do you trust?

  • Post author: Omid Farhang
  • Post published: April 25, 2013
  • Reading Time: 5 min
  • Word Count: 1044 words

Cross-posted from PCMag SecurityWatch: Last week independent antivirus lab AV-Comparatives released the results of an on-demand antivirus detection test. The fact that Microsoft came in near the bottom wasnā€™t big news; the fact that Symantec scored even lower was surprising indeed. In a blog post released today, Symantec decried the entire practice of performing on-demand malware scanning tests, calling it ā€œmisleading.ā€ In the early years of antivirus testing, every test was an on-demand scanning test. Researchers would assemble a collection of known malware, run a full scan, and record the percentage of samples detected. Modern labs work hard to devise tests that more closely reflect a userā€™s real-world experience, taking into account the fact that the vast majority of infections enter the computer from the Internet. Symantec contends that only the real-world sort of test is valid; I donā€™t entirely agree. ...

Continue Reading Symantec vs AV-Comparatives, Which one do you trust?

Boston Marathon Bombing Links May Hide Java-Based Exploits

  • Post author: Omid Farhang
  • Post published: April 17, 2013
  • Reading Time: 3 min
  • Word Count: 629 words

PCMag: My social media accounts and email inbox are full of links to stories about the horrific incident in Boston earlier this week. I am reading about the victims, the bystanders and first responders that rushed to help, and looking for updates on the investigation. It turns out I should be careful about what links I click on, as cyber-criminals have already started exploiting the tragedy for their own nefarious purposes, security experts told SecurityWatch. ...

Continue Reading Boston Marathon Bombing Links May Hide Java-Based Exploits